Table of contents

  1. Front Matter
    Pages 1-12
  2. Joachim von zur Gathen
    Pages 13-18
  3. Joachim von zur Gathen
    Pages 19-60
  4. Joachim von zur Gathen
    Pages 61-108
  5. Joachim von zur Gathen
    Pages 109-156
  6. Joachim von zur Gathen
    Pages 157-168
  7. Joachim von zur Gathen
    Pages 169-206
  8. Joachim von zur Gathen
    Pages 207-240
  9. Joachim von zur Gathen
    Pages 241-262
  10. Joachim von zur Gathen
    Pages 263-300
  11. Joachim von zur Gathen
    Pages 301-320
  12. Joachim von zur Gathen
    Pages 321-346
  13. Joachim von zur Gathen
    Pages 347-368
  14. Joachim von zur Gathen
    Pages 369-408
  15. Joachim von zur Gathen
    Pages 409-418
  16. Joachim von zur Gathen
    Pages 419-432
  17. Joachim von zur Gathen
    Pages 433-446
  18. Joachim von zur Gathen
    Pages 447-498
  19. Joachim von zur Gathen
    Pages 499-528
  20. Joachim von zur Gathen
    Pages 529-554

About this book

Introduction

This book offers an introduction to cryptology, the science that makes secure communications possible, and addresses its two complementary aspects: cryptography — the art of making secure building blocks — and cryptanalysis — the art of breaking them. The text describes some of the most important systems in detail, including AES, RSA, group-based and lattice-based cryptography, signatures, hash functions, random generation, and more, providing detailed underpinnings for most of them. With regard to cryptanalysis, it presents a number of basic tools such as the differential and linear methods and lattice attacks.

This text, based on lecture notes from the author’s many courses on the art of cryptography, consists of two interlinked parts. The first, modern part explains some of the basic systems used today and some attacks on them. However, a text on cryptology would not be complete without describing its rich and fascinating history. As such, the colorfully illustrated historical part interspersed throughout the text highlights selected inventions and episodes, providing a glimpse into the past of cryptology.

The first sections of this book can be used as a textbook for an introductory course to computer science or mathematics. Other sections are suitable for advanced undergraduate or graduate courses. Many exercises are included. The emphasis is on providing a (reasonably) complete explanation of the background for some selected systems.

<

Joachim von zur Gathen has held professorships at the universities of Toronto, Paderborn, and Bonn, each for more than a decade. He is now retired (and active). His numerous visiting professorships were in Australia, Chile, Germany, South Africa, Spain, Switzerland, Uruguay, and USA. He is founder and was editor-in-chief for 25 years of the journal computational complexity, and was on the editorial boards of several other journals. He is listed in various editions of Who's Who in the World.

Keywords

cryptology cryptography cryptanalysis fundamentals of cryptography history of cryptography AES RSA Diffie-Hellman elliptic curves hash functions digital signatures reductions random generation lattice cryptography quantum computing

Authors and affiliations

  • Joachim von zur Gathen
    • 1
  1. 1.b-it, Universität BonnBonnGermany

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-662-48425-8
  • Copyright Information Springer-Verlag Berlin Heidelberg 2015
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-662-48423-4
  • Online ISBN 978-3-662-48425-8
  • About this book
Industry Sectors
Electronics
Telecommunications
Aerospace
Pharma